Exploiting transition locality in automatic verification

17Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we present an algorithm to contrast state explosion when using Explicit State Space Exploration to verify protocols. We show experimentally that protocols exhibit transition locality. We present a verification algorithm that exploits transition locality as well as an implementation of it within the Mur verifier. Our algorithm is compatible with all Breadth First (BF) optimization techniques present in the Mur(formula presented) verifier and it is by no means a substitute for any of them.In fact, since our algorithm trades space with time, it is typically most useful when one runs out of memory and has already used all other state reduction techniques present in the Mur(formula presented) verifier. Our experimental results show that using our approach we can typically save more than 40% of RAM with an average time penalty of about 50% when using (Mur(formula presented)) bit compression and 100% when using bit compression and hash compaction.

Cite

CITATION STYLE

APA

Tronci, E., Penna, G. D., Intrigila, B., & Zilli, M. V. (2001). Exploiting transition locality in automatic verification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2144, pp. 259–274). Springer Verlag. https://doi.org/10.1007/3-540-44798-9_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free